Know The Attacker

When everything else fails deception wins.

Today’s information technology landscape is threatened by modern advanced security attacks, including 0-day exploits, polymorphic malware, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers’ evolution, defenders now have a new kind of weapon in their arsenal: Deception.

Current security solutions are inneficient

Common defensive security solutions, such as anti-malware, UTM, IDS/IPS, anti-spam, content filtering, Security Policies, even DLP and SIEM, are unable to detect advanced attacks or face unknown threats. At the same time they generate large amounts of false positives that consume time and direct administrators away from the actual danger. Attackers are now very careful in order to avoid getting caught, and by using modern attack methods they avoid being detected.

Deception can see what others don’t

Deception Technologies is a category of defensive methods that can detect, identify, analyze, and defend against unknown and advanced attacks. They allow immediate identification of the attack, have a high degree of accuracy and give the defender the ability to monitor the attack. By deceiving the attackers, they detect and manage the attack in its full development.

Your security systems can identify known threats, but illicium can identify everything else

Illicium is an innovative deception platform that enables organizations detect and identify sophisticated information security attacks. It has a unique architecture that integrates all modern deception techniques in one product, and a powerful interface that gives full power to the defender. By deploying a number of sophisticated baits throughout the organization, it deceives the attacker and makes him believe he is hacking the real assets, while at the same time his actions are fully monitored in an isolated environment. This way it allows you to identify and close the attack path in order to prevent future attacks.

Deploy sophisticated deception in 3 simple steps with

1.

Install Illicium

Either in virtual or physical form, Illicium appliance installation is very simple. Once you have configured your user, you are ready to start building your deception environment.

2.

Deploy Deception

Designing and implementing effective deception scenarios is as simple as following guided steps. Illicium documentation includes the Deception Deployment Guide which provides you with a complete methodology on creating effective deception scenarios. Complete the scenario form, deploy the scenario in Illicium and you are ready!

3.

Catch the Attacker!

Once the deception scenarios have been deployed, Illicium waits for the attacker to fall in your traps. At the very moment a bait is triggered, you are in control. You can then isolate the attacker in the DeepMaze (an isolated network that looks like your own) and let him try to exploit fake systems while you take all the steps to mitigate the threat.

Select your offering

Basic Bundle

Includes the Illicium appliance (either in hardware, VM or cloud format), it’s user friendly documentation, installation support services, it’s license sized to your needs, and Maintenance and Support services.

Training and Consulting

Provided in our Standard services package, our integration engineers will design and implement the installation of Illicium in your environment, and train your personnel in administration and usage of Illicium.

Analysis

Information security analysts specialized in Cyber Deception analyze your environment, designed customized deception scenarios and provide you with a complete plan of baits that need to be deployed in your infrastructure to protect your most critical assets from advanced attacks.

Deployment

After a Deception Plan has been elaborated, our analysts will deploy the required baits in your Illicium installation, and configure and develop all required rules so that all baits provide you with sufficient attack information.

Find us in

Cookie and Privacy Settings

How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Click to enable/disable google analytics tracking.

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.